{"title":"OpenStack云的联邦身份管理综述","authors":"Rohit Shere, S. Srivastava, R. K. Pateriya","doi":"10.1109/RISE.2017.8378210","DOIUrl":null,"url":null,"abstract":"With technology advancement adoption of service oriented architecture is gaining momentum, Identity Management) is an authentication and authorization service provided for secure storage and information access. It is used to manage data security and confidentiality which is beneficial to both client side and provider side. Some of the authentication techniques like OpenStack Keystone have the drawback of data violation, inappropriate access and use of centralized service architecture makes it vulnerable to single point of failure. For providing better data security, authentication and authorization to end users' Federated Identity Management is systematic, adoptable and well-structured approach which can be applied to the cloud for its enhancement. This paper describes the different implementation of the protocol independent federated identity management (FIM) system components on cloud. Comparison chart covering merit and demerit of the different independent approaches are also covered in this paper.","PeriodicalId":166244,"journal":{"name":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"5","resultStr":"{\"title\":\"A review of federated identity management of OpenStack cloud\",\"authors\":\"Rohit Shere, S. Srivastava, R. K. Pateriya\",\"doi\":\"10.1109/RISE.2017.8378210\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With technology advancement adoption of service oriented architecture is gaining momentum, Identity Management) is an authentication and authorization service provided for secure storage and information access. It is used to manage data security and confidentiality which is beneficial to both client side and provider side. Some of the authentication techniques like OpenStack Keystone have the drawback of data violation, inappropriate access and use of centralized service architecture makes it vulnerable to single point of failure. For providing better data security, authentication and authorization to end users' Federated Identity Management is systematic, adoptable and well-structured approach which can be applied to the cloud for its enhancement. This paper describes the different implementation of the protocol independent federated identity management (FIM) system components on cloud. Comparison chart covering merit and demerit of the different independent approaches are also covered in this paper.\",\"PeriodicalId\":166244,\"journal\":{\"name\":\"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)\",\"volume\":\"23 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-10-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"5\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/RISE.2017.8378210\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 International Conference on Recent Innovations in Signal processing and Embedded Systems (RISE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/RISE.2017.8378210","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A review of federated identity management of OpenStack cloud
With technology advancement adoption of service oriented architecture is gaining momentum, Identity Management) is an authentication and authorization service provided for secure storage and information access. It is used to manage data security and confidentiality which is beneficial to both client side and provider side. Some of the authentication techniques like OpenStack Keystone have the drawback of data violation, inappropriate access and use of centralized service architecture makes it vulnerable to single point of failure. For providing better data security, authentication and authorization to end users' Federated Identity Management is systematic, adoptable and well-structured approach which can be applied to the cloud for its enhancement. This paper describes the different implementation of the protocol independent federated identity management (FIM) system components on cloud. Comparison chart covering merit and demerit of the different independent approaches are also covered in this paper.